While no one is immune to cybersecurity threats, planning and preparation are critical to an effective response.

Identify Risks and Build a Plan

Every organization with significant information assets should have a written plan to support its security and privacy programs and to lay out compliance objectives, key people and steps to take in case of an incident. The overall approach to mitigating privacy and security risk and the complexity of these programs varies from company to company depending on size and industry.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]